US8209538B2 - Email policy manager - Google Patents
Email policy manager Download PDFInfo
- Publication number
- US8209538B2 US8209538B2 US10/568,451 US56845104A US8209538B2 US 8209538 B2 US8209538 B2 US 8209538B2 US 56845104 A US56845104 A US 56845104A US 8209538 B2 US8209538 B2 US 8209538B2
- Authority
- US
- United States
- Prior art keywords
- mail message
- sender
- message
- outgoing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims 6
- 230000001960 triggered effect Effects 0.000 claims 2
- 230000001419 dependent effect Effects 0.000 abstract description 6
- 230000008520 organization Effects 0.000 description 7
- 241000700605 Viruses Species 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/063—Content adaptation, e.g. replacement of unsuitable content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Definitions
- This invention relates to an email policy manager, for use in an email system. More particularly, the invention may be applied to a boundary agent, and a method used therein, for applying email policy.
- Email is a convenient way for computer users to communicate, and in particular provides a very convenient way for a computer user to transmit data to another computer user.
- emails may be used to send confidential information to unauthorized recipients outside the organization.
- emails may be used to send attachments in the form of program executables. This can lead to another difficulty arising from the use of email, namely the spread of computer viruses, which may be sent as executable file attachments to emails.
- a boundary agent is a software application, which is provided on a local area network (LAN) having an internet connection, and monitors emails being sent over the internet by users connected to the LAN.
- the boundary agent can then detect emails whose attachments may contain viruses. Similarly, the boundary agent can detect emails whose content is suspicious. For example, emails containing specific key words can be regarded as suspicious. Also, emails having large attachments, or specific filetypes as attachments, can be regarded as suspicious.
- boundary agents can allow the email policy to be user-dependent.
- the rules, which determine which emails are treated as suspicious can vary from one user to another.
- emails having that type of attachment may be treated as suspicious if they are sent by personnel within the second group.
- Boundary agents applying such user-dependent email policies use the “From” field in the email message to identify the sender of the message, and then determine the rules which are to be followed for that user's messages.
- WO01/37496 discloses an alternative email policy manager.
- the policy may determine whether or not to add a digital signature to the email and whether or not to encrypt the message.
- the system uses the “From” field in the email message to identify the sender of the message, and then determines the policy to be applied on that basis.
- the content of the “From” field can be forged, and is no guarantee of the identity of the sender of the message.
- U.S. Pat. No. 5,956,408 describes a method for distributing data, in which data is encrypted using a private key of the data sender, and digitally signed by the sender. The recipient decrypts the encrypted data, using a public key of the data sender, and verifies the digital signature. If the digital signature is verified, the decrypted data is enabled for use.
- digital signatures are typically used only by a recipient of a message to confirm the identity of the sender or the validity of the message, after the message has been transmitted across a network.
- U.S. Patent Application No. 2003/0135737 discloses a system for use by a service provider, in which the service provider determines whether to forward a received message, based on verifying the signature in the message.
- a method of applying an email policy to determine whether a message should be allowed to be transmitted from a local area network across a wide area network applies a sender-dependent policy, using a digital signature to identify the sender of a message.
- FIG. 1 is a block schematic diagram of a computer network.
- FIG. 2 is a flow chart, illustrating a method according to the present invention.
- FIG. 1 shows a computer network 10 , which includes a local area network (LAN) 15 , having personal computers (PCs) 16 , 17 , 18 , 19 connected to it.
- the LAN has a connection to a wide area network (WAN) 25 , which in this illustrated embodiment is the internet.
- WAN wide area network
- PC personal computer
- One common use of a computer network is to transmit electronic mail messages.
- the user of one of the personal computers 16 - 19 can transmit electronic mail messages to the user of the personal computer 30 .
- Such messages can contain text alone, or they can have attachments in the form of computer files.
- the local area network 15 includes a boundary agent 32 , which takes the form of software running on a mail server (not shown) in the network 15 .
- the boundary agent 32 inspects the email traffic, which is intended to be transmitted over the internet 15 . For example, the boundary agent 32 automatically checks mail messages for viruses.
- FIG. 2 is a flow chart, showing a method performed by the boundary agent in accordance with the present invention.
- step 70 the boundary agent 32 inspects a mail message, which has been transmitted from one of the personal computers 16 - 19 , intended for an external computer user, for example a user of the computer 30 .
- step 72 the boundary agent 32 determines whether the message contains a digital signature and, if so, the boundary agent 32 determines in step 74 whether the digital signature can be verified.
- a digital signature is a code which can be incorporated in an electronic mail message in order to identify the sender of the message.
- Conventional desktop email creating programs incorporate a feature allowing a digital signature to be added.
- an infrastructure must be provided to allow the verification of digital signatures, and this will not be described in detail herein. Briefly, it is possible to verify a digital signature by checking with a Certification Authority, which maintains (either directly or indirectly) a list of valid digital signatures and the identities of the associated users.
- step 72 If it is determined in step 72 that the message contains a digital signature, and if the digital signature is verified in step 74 , the process passes to step 76 . It should be noted that the verification of the digital signature may also confirm that the message has not been compromised during transport.
- step 76 the process applies a sender-specific email policy. That is, having extracted the purported identity of the user from the message, and having verified that the digital signature applies to the same user, the boundary agent 32 determines whether the message, and any attachments, comply with an email policy which is specific to the user identified in the message. For this purpose, the boundary agent 32 maintains a list of users, and the respective email policies which are to be applied to messages sent by those users.
- emails containing key words relating to that subject do not comply with the sender-specific email policy, if they are sent by personnel within the second group.
- emails having that type of attachment do not comply with the sender-specific email policy, if they are sent by users within the second group.
- step 76 If it is determined in step 76 that the message complies with the sender-specific email policy, the process passes to step 78 , and the message is allowed to be transmitted over the internet 25 . By contrast, if it is determined in step 76 that the message does not comply with the sender-specific email policy, the process passes to step 80 , and appropriate measures are applied.
- the message may be blocked, with or without notification to the sender, or may be quarantined for review by IT personnel responsible for operation of the local area network 15 , or, in the case where it is an attachment which causes non-compliance with the email policy, the message may be transmitted without the attachment.
- step 72 If it is determined in step 72 that the message does not contain a digital signature, or if is determined in step 74 that the digital signature is not verified, the process passes to step 82 .
- the process applies a default email policy.
- the default email policy tests for specific keywords in messages, and for specific filetypes as attachments, in the same way as the sender-specific email policies described above. However, it is typically more restrictive in all respects than the sender-specific email policies applied to messages with verified digital signatures. That is, the default email policy may have a longer list of keywords which mark a message as non-compliant, or may regard more different filetypes as non-compliant.
- step 82 If it is determined in step 82 that the message complies with the default email policy, the process passes to step 78 , and the message is allowed to be transmitted over the internet 25 , as described above. If it is determined in step 82 that the message does not comply with the default email policy, the process passes to step 80 , and appropriate measures are applied, again as described above.
- the default email policy is typically more restrictive in all respects than the sender-specific email policies applied to messages with verified digital signatures. Indeed, the default email policy may be such that no messages can comply with it. That is, all messages are rejected, unless they contain a verified digital signature.
- a message without a digital signature may result from a simple omission.
- a message with a digital signature which does not match the purported sender identified in the message itself may be the result of a deliberate attempt to circumvent security procedures. Messages in these two categories may therefore be treated differently.
- the invention has been specifically described above with reference to its application in a boundary agent, to determine whether an email message can be transmitted across a boundary, for example to determine whether an email message can be transmitted outside a corporate local area network.
- a boundary agent to determine whether an email message can be transmitted across a boundary
- the same method can be applied at any point in a network, for example within a local area network, to determine whether an email message can be further transmitted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0319363.8 | 2003-08-18 | ||
GB0319363A GB2405293B (en) | 2003-08-18 | 2003-08-18 | Email policy manager |
PCT/GB2004/003541 WO2005020527A1 (en) | 2003-08-18 | 2004-08-16 | Email policy manager |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070168666A1 US20070168666A1 (en) | 2007-07-19 |
US8209538B2 true US8209538B2 (en) | 2012-06-26 |
Family
ID=28052693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/568,451 Active 2026-04-24 US8209538B2 (en) | 2003-08-18 | 2004-08-16 | Email policy manager |
Country Status (4)
Country | Link |
---|---|
US (1) | US8209538B2 (en) |
EP (1) | EP1698128A1 (en) |
GB (1) | GB2405293B (en) |
WO (1) | WO2005020527A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US9959417B2 (en) | 2008-11-18 | 2018-05-01 | Workshare, Ltd. | Methods and systems for preventing transmission of sensitive data from a remote computer device |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US10133723B2 (en) | 2014-12-29 | 2018-11-20 | Workshare Ltd. | System and method for determining document version geneology |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US10880359B2 (en) | 2011-12-21 | 2020-12-29 | Workshare, Ltd. | System and method for cross platform document sharing |
US10911492B2 (en) | 2013-07-25 | 2021-02-02 | Workshare Ltd. | System and method for securing documents prior to transmission |
US11030163B2 (en) | 2011-11-29 | 2021-06-08 | Workshare, Ltd. | System for tracking and displaying changes in a set of related electronic documents |
US11182551B2 (en) | 2014-12-29 | 2021-11-23 | Workshare Ltd. | System and method for determining document version geneology |
US11341191B2 (en) | 2013-03-14 | 2022-05-24 | Workshare Ltd. | Method and system for document retrieval with selective document comparison |
US11386394B2 (en) | 2011-06-08 | 2022-07-12 | Workshare, Ltd. | Method and system for shared document approval |
US11763013B2 (en) | 2015-08-07 | 2023-09-19 | Workshare, Ltd. | Transaction document management system and method |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7509120B2 (en) * | 2004-09-07 | 2009-03-24 | Research In Motion Limited | System and method for updating message trust status |
US7636939B2 (en) * | 2004-12-10 | 2009-12-22 | Microsoft Corporation | Endpoint identification and security |
US7810160B2 (en) | 2005-12-28 | 2010-10-05 | Microsoft Corporation | Combining communication policies into common rules store |
US8396211B2 (en) | 2006-07-11 | 2013-03-12 | Research In Motion Limited | System and method for dynamic modification of allowable electronic message properties |
EP1879135B1 (en) * | 2006-07-11 | 2008-11-19 | Research In Motion Limited | System and method for dynamic modification of allowable electronic message properties |
US8880989B2 (en) | 2012-01-30 | 2014-11-04 | Microsoft Corporation | Educating users and enforcing data dissemination policies |
US9087039B2 (en) | 2012-02-07 | 2015-07-21 | Microsoft Technology Licensing, Llc | Language independent probabilistic content matching |
US8868667B2 (en) * | 2012-03-02 | 2014-10-21 | Verizon Patent And Licensing Inc. | Email attachment helper |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5555346A (en) * | 1991-10-04 | 1996-09-10 | Beyond Corporated | Event-driven rule-based messaging system |
US5889943A (en) | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5943426A (en) | 1995-09-25 | 1999-08-24 | Motorola, Inc. | Method and apparatus for relaying digitally signed messages |
US5956408A (en) | 1994-09-15 | 1999-09-21 | International Business Machines Corporation | Apparatus and method for secure distribution of data |
WO2000010288A1 (en) | 1998-08-14 | 2000-02-24 | Omnipoint Corporation | Apparatus and method for an authenticated electronic userid |
US6085321A (en) | 1998-08-14 | 2000-07-04 | Omnipoint Corporation | Unique digital signature |
WO2001037496A1 (en) | 1999-11-16 | 2001-05-25 | Orad Software Limited | A secure email delivery system |
US20020007453A1 (en) | 2000-05-23 | 2002-01-17 | Nemovicher C. Kerry | Secured electronic mail system and method |
US6356935B1 (en) | 1998-08-14 | 2002-03-12 | Xircom Wireless, Inc. | Apparatus and method for an authenticated electronic userid |
US6393464B1 (en) | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
US20020181703A1 (en) * | 2001-06-01 | 2002-12-05 | Logan James D. | Methods and apparatus for controlling the transmission and receipt of email messages |
WO2003001326A2 (en) | 2001-06-22 | 2003-01-03 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US20030135737A1 (en) | 2001-12-31 | 2003-07-17 | Nicolas Bouthors | Method for protecting an exchange of data by remote means |
US20030163540A1 (en) * | 2002-02-27 | 2003-08-28 | Brian Dorricott | Filtering e-mail messages |
US6643684B1 (en) * | 1998-10-08 | 2003-11-04 | International Business Machines Corporation | Sender- specified delivery customization |
US20040111519A1 (en) * | 2002-12-04 | 2004-06-10 | Guangrui Fu | Access network dynamic firewall |
US20050080914A1 (en) * | 2003-10-14 | 2005-04-14 | Grand Central Communications, Inc., A Delaware Corporation | Policy management in an interoperability network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE347200T1 (en) * | 1997-07-24 | 2006-12-15 | Tumbleweed Comm Corp | ELECTRONIC MAIL FIREWALL WITH ENCRYPTION/DECRYPTION USING STORED KEYS |
-
2003
- 2003-08-18 GB GB0319363A patent/GB2405293B/en not_active Expired - Lifetime
-
2004
- 2004-08-16 EP EP04768101A patent/EP1698128A1/en not_active Withdrawn
- 2004-08-16 WO PCT/GB2004/003541 patent/WO2005020527A1/en active Application Filing
- 2004-08-16 US US10/568,451 patent/US8209538B2/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5555346A (en) * | 1991-10-04 | 1996-09-10 | Beyond Corporated | Event-driven rule-based messaging system |
US5956408A (en) | 1994-09-15 | 1999-09-21 | International Business Machines Corporation | Apparatus and method for secure distribution of data |
US5943426A (en) | 1995-09-25 | 1999-08-24 | Motorola, Inc. | Method and apparatus for relaying digitally signed messages |
US5889943A (en) | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
WO2000010288A1 (en) | 1998-08-14 | 2000-02-24 | Omnipoint Corporation | Apparatus and method for an authenticated electronic userid |
US6085321A (en) | 1998-08-14 | 2000-07-04 | Omnipoint Corporation | Unique digital signature |
US6356935B1 (en) | 1998-08-14 | 2002-03-12 | Xircom Wireless, Inc. | Apparatus and method for an authenticated electronic userid |
US6643684B1 (en) * | 1998-10-08 | 2003-11-04 | International Business Machines Corporation | Sender- specified delivery customization |
US6393464B1 (en) | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
WO2001037496A1 (en) | 1999-11-16 | 2001-05-25 | Orad Software Limited | A secure email delivery system |
US20020007453A1 (en) | 2000-05-23 | 2002-01-17 | Nemovicher C. Kerry | Secured electronic mail system and method |
US20020181703A1 (en) * | 2001-06-01 | 2002-12-05 | Logan James D. | Methods and apparatus for controlling the transmission and receipt of email messages |
WO2003001326A2 (en) | 2001-06-22 | 2003-01-03 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US20030135737A1 (en) | 2001-12-31 | 2003-07-17 | Nicolas Bouthors | Method for protecting an exchange of data by remote means |
US20030163540A1 (en) * | 2002-02-27 | 2003-08-28 | Brian Dorricott | Filtering e-mail messages |
US20040111519A1 (en) * | 2002-12-04 | 2004-06-10 | Guangrui Fu | Access network dynamic firewall |
US20050080914A1 (en) * | 2003-10-14 | 2005-04-14 | Grand Central Communications, Inc., A Delaware Corporation | Policy management in an interoperability network |
Non-Patent Citations (4)
Title |
---|
"Cryptography: A Guide for the Design and Implementation of Secure Systems", by Carl H. Meyer and Stephen M. Matyas, ISBN 0-471-04892-5, Wiley (1982). |
"sendmail", by Bryan Costales, Eric Allman and Neil Rickert, ISBN 1-56592-056-2, O'Reilly (1993) pp. 243-244. |
http://www.tumbleweed.com/en/repos/2199-MMS Brochure.pdf, Tumbleweed MMS (Messaging Management System), Tumbleweed Communications, last modified May 28, 2003. |
New Directions in Cryptography IEEE Trans.Inf. Theory Diffie et al. IT-22 pp. 644-654 (1976). |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10963578B2 (en) | 2008-11-18 | 2021-03-30 | Workshare Technology, Inc. | Methods and systems for preventing transmission of sensitive data from a remote computer device |
US9959417B2 (en) | 2008-11-18 | 2018-05-01 | Workshare, Ltd. | Methods and systems for preventing transmission of sensitive data from a remote computer device |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US10445572B2 (en) | 2010-11-29 | 2019-10-15 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US11042736B2 (en) | 2010-11-29 | 2021-06-22 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over computer networks |
US11386394B2 (en) | 2011-06-08 | 2022-07-12 | Workshare, Ltd. | Method and system for shared document approval |
US11030163B2 (en) | 2011-11-29 | 2021-06-08 | Workshare, Ltd. | System for tracking and displaying changes in a set of related electronic documents |
US10880359B2 (en) | 2011-12-21 | 2020-12-29 | Workshare, Ltd. | System and method for cross platform document sharing |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US11341191B2 (en) | 2013-03-14 | 2022-05-24 | Workshare Ltd. | Method and system for document retrieval with selective document comparison |
US10911492B2 (en) | 2013-07-25 | 2021-02-02 | Workshare Ltd. | System and method for securing documents prior to transmission |
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US11182551B2 (en) | 2014-12-29 | 2021-11-23 | Workshare Ltd. | System and method for determining document version geneology |
US10133723B2 (en) | 2014-12-29 | 2018-11-20 | Workshare Ltd. | System and method for determining document version geneology |
US11763013B2 (en) | 2015-08-07 | 2023-09-19 | Workshare, Ltd. | Transaction document management system and method |
Also Published As
Publication number | Publication date |
---|---|
GB0319363D0 (en) | 2003-09-17 |
GB2405293B (en) | 2007-04-25 |
EP1698128A1 (en) | 2006-09-06 |
US20070168666A1 (en) | 2007-07-19 |
GB2405293A (en) | 2005-02-23 |
WO2005020527A1 (en) | 2005-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8209538B2 (en) | Email policy manager | |
US11722513B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US11044267B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
KR100414238B1 (en) | Secure network protocol system and method | |
EP3128459B1 (en) | System and method of utilizing a dedicated computer security service | |
US7487213B2 (en) | Techniques for authenticating email | |
US7571319B2 (en) | Validating inbound messages | |
Shirey | RFC 4949: Internet security glossary, version 2 | |
US7422115B2 (en) | Techniques for to defeat phishing | |
Padlipsky et al. | Limitations of end-to-end encryption in secure computer networks | |
US20060053293A1 (en) | User interface and anti-phishing functions for an anti-spam micropayments system | |
US20060248575A1 (en) | Divided encryption connections to provide network traffic security | |
US20220337568A1 (en) | System and Method for Encryption, Storage and Transmission of Digital Information | |
US7216233B1 (en) | Apparatus, methods, and computer program products for filtering information | |
KR20120090905A (en) | Secure safe sender list | |
Derouet | Fighting phishing and securing data with email authentication | |
US20190019154A1 (en) | Intelligent, context-based delivery of sensitive email content to mobile devices | |
US20200220729A1 (en) | System and method for authenticating a sender of an electronic mail (e-mail) over a network | |
JP2007087327A (en) | Electronic mail processing program | |
US9967242B2 (en) | Rich content scanning for non-service accounts for email delivery | |
US20050210246A1 (en) | Secure email service | |
Rose et al. | Trustworthy email | |
CN100477647C (en) | E-mail management system and method | |
JP2007102334A (en) | System, method and computer program for preventing information leakage by e-mail | |
US20030154409A1 (en) | Mobile communications terminal and data transmitting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CLEARSWIFT LIMITED, GREAT BRITAIN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CRAIGIE, JIM;REEL/FRAME:018587/0883 Effective date: 20061108 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |